New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 612808 link

Starred by 4 users

Issue metadata

Status: WontFix
Owner:
Last visit > 30 days ago
Closed: Jul 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: All
Pri: 2
Type: Feature



Sign in to add a comment

webRTC and TLS Decryption

Reported by kenneth....@gmail.com, May 18 2016

Issue description

UserAgent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36

Steps to reproduce the problem:
Many enterprise environments require interception of traffic to and from internet and clients to be able to detect malware/viruses and exploit signatures. WebRTC requires the usage of PFS with ECDHE which makes this impossible.

What is the expected behavior?
It would be a very nice feature to be able to choose a strong non pfs cipher so we can intercept the traffic going in and out of our network or between our clients.

What went wrong?
Not possible to intercept the trafic through surf proxy

Did this work before? N/A 

Chrome version: 50.0.2661.102  Channel: stable
OS Version: 6.1 (Windows 7, Windows Server 2008 R2)
Flash Version: Shockwave Flash 21.0 r0

This is our observation on the behavior of webRTC. There may be other approaches to this, the bottom line is however that we need this functionality to allow full webRTC functionality
 
Components: Blink>WebRTC>Network
Cc: juberti@chromium.org jansson@chromium.org
Labels: -OS-Windows -Type-Bug OS-All Type-Feature
Owner: pthatcher@chromium.org
Status: Assigned (was: Unconfirmed)
How is PFS relevant here? You won't be able to decrypt the traffic even in non-PFS modes.
As far as we see it PFS does not allow private keys. Other methods allows private keys which in turn will allow(if knowing the private key) decrypting and intercept the trafic.

I understand PFS being a great method for the consumer side
Owner: mattdr@chromium.org
Labels: WebrtcTriaged
Do you control the clients?
Yes, we control the clients on our end, as well as the proxy. We will not however control the clients joining the meetings(e.g anyone on the internet)

Comment 9 by mattdr@webrtc.org, May 24 2016

To be sure, the choice of ciphersuites with PFS makes life harder for *all* potential eavesdropppers, even the good guys. To the extent that Chrome+WebRTC encourages or mandates such ciphers, though, they're in good company -- for example, we see similar decisions being made for TLS 1.3. I don't see the trend stopping any time soon.

Relying on a small set of the best ciphers helps keep implementations simple, which tends to mean more secure. Past events suggest that adding complexity in order to enable less capable ciphersuites will result in an exploitable security vulnerability with a punny name like I-Can-RTC-You.

I understand the necessities of network monitoring and intrusion detection, but changing protocols to facilitate MitM cannot be the answer.
I do understand the benefits for PFS, dont get me wrong. :) 

Based on your answer I interpret that we will not see any features allowing network monitoring and intrusion through this method.

What would be the recommendation for us(and other enterprises) going forward?

Comment 11 by tommi@chromium.org, May 26 2016

Cc: hta@chromium.org tommi@chromium.org

Comment 12 by hta@chromium.org, May 26 2016

This is Working As Intended.

If you are content with watching how much traffic goes by, and allowing/denying traffic to certain destinations, there are some allowances in the standard for configuring a set of TURN proxies that can be configured by the admins; see the end of this section for a hint:

https://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-11#section-5.4

In order to decrypt the traffic you need access to the session keys; it was a design choice to not provide any mechanism for such access.

Is your goal to limit WebRTC usage to approved sites, or do you want to actually collect unencrypted media to meet compliance requirements?

Can you explain how you make this work for WebRTC with non-PFS ciphers?
Our current compliance requirements say,among other things,that any trafic going IN towards our clients needs to be incercepted in order to guarantee no malicious code gets in to our network. We can do this today with e.g HTTPS

One solution to this) could be to limit webRTC to approved sites, but this will not work if the webRTC app/site is designed to allow e.g citizens(=we cannot trust/approv their devices) to interact with our employees. 

This is where we see great benefit of webRTC as it is plattform independent and requires no plugins. The downside is how to handle the security aspect?

Will this https://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-11#section-5.4 help in this regard?
Status: WontFix (was: Assigned)
Echoing hta@ in #12. We're not planning any work on this.

Comment 16 by hta@chromium.org, Aug 1 2016

In response to #14: No, IP location privacy controls won't help with interception of content. There have been discussions in W3C about having site configuration parameters that require all traffic to go (encrypted) via an organization-mandated proxy, but the consensus seemed to be that this wouldn't be surfaced in the API, so it's out of scope for the standards process.

Sign in to add a comment